Data and identity theft is a serious and growing threat.

According to a survey by independent market research company StrategyOne, commissioned by Symantec, 65% of all people globally have been victims of computer crime, which caused considerable damage. McAffee estimates the damage worldwide to $ 1 trillion annually.

Basic "delete" operations only remove bits of information from files, so they just appear deleted. It is easy to retrieve those files with common file recovery tools.

And even simple overwritten data can be recovered using sophisticated tools, such as magnetic force microscopes. One standard way to recover data that has been overwritten is to capture and process the analog signal obtained from the hard drive's read/write head. This analog signal will be close to an ideal digital signal, but the differences will reveal important information.

Basis "delete" operation( unsecure )

Simple overwriten( unsecure )

Shredding( secure )

Secure Deletion:

The only way to protect your company and yourself from data or identity theft is to shred sensitive documents at the source with a high security tool that is capable of rewriting the files with random series of binary data multiple times.

One of the most secure file shredding application is High Secure Shredder. It supports the most secure document shredding standards world wide, including the United States Department of Defense 5220.22-M National Industrial Security Standard, the USAF Cryptologic Support Center purging Standard and the Gutmann method.